Stay up to date on company and partner news, product tips, and industry trends.

A Milestone for Wireless U2F

The FIDO Universal 2nd Factor (U2F) protocol passed a significant milestone last month. They added new transport protocols that emphatically answer questions about support for mobile devices. Yubico is a leading contributor to the U2F specs, including the USB transport and the new specs for Bluetooth and Near Field Communication (NFC). We are now excited


Jul 8, 2015

Yubico Webinar: Google Talks Security Key, Apps

Google is doubling down on authentication with a strong commitment to FIDO’s Universal Second Factor (U2F) protocol and Yubico’s Security Key as part of an expanding emphasis on security. The cloud computing giant joined Yubico on a live Webinar to continue a conversation entitled “Google for Work, FIDO U2F, and YubiKeys.” A recording of the


Innovative Projects Topped with YubiKing Crowns

Break out the trumpets. Lower the drawbridge. The YubiKings are here to claim their thrones! Today, Yubico is announcing the three winners of the months-long YubiKing contest, designed to discover who had mad enough skills to build the most innovative, creative and compelling solution around the YubiKey. We received and evaluated a pile of fantastic


Jun 26, 2015

Yubico CEO to EU: Open Standards Nurture Trust

Trust has to be a cornerstone in order to protect the online identities of 500 million people doing business across borders, Yubico’s CEO and Founder, Stina Ehrensvard, told an exclusive crowd of 500 EU digital policy makers and industry representatives last week at Digital Assembly 2015 in Riga, Latvia. She held up a single YubiKey


Cloud ID Summit Sharpens Focus on Future of IAM Standards

One common theme across the talks at last week’s Cloud Identity Summit (CIS) revealed a desire to simplify and unify existing identity and access management (IAM) technologies and standards to build a pragmatic approach to modern identity. For years, authentication, authorization, single sign-on (SSO), federation, governance, risk, compliance, standards, etc., etc. have all been pointing


Hello, SSO. It’s me, authentication

There’s a secret that single sign-on (SSO) never talks about. It’s called authentication. The SSO conversation starts without mentioning the assumption that the user is already logged in. A login that requires a password. Instead, SSO is quickly positioned to triumph over the dangers of weak and reused passwords. Many times, however, those same suspect passwords


May 27, 2015

Ode to the value of Backup YubiKey(s)

A few weeks ago, I was in my hotel and reached into my pocket to get my YubiKey. Without it, I can’t log into certain email, CMS or other systems without going through an involved IT administrative process. The key was gone. That is an instantaneous bad feeling, wiped away only by the backup YubiKey